Configure access requests
Before end users can request access to resources in Identity Cloud, you must:
Define resources that can be requested
By default, end users in Identity Cloud can’t request
access to a
resource.
For an end user to request access to a resource, the resource must
be marked as Requestable
to display in the access catalog.
You can make applications, entitlements, and roles requestable in Identity Governance.
Applications
To make applications requestable:
-
From the Identity Cloud admin UI, go to Applications.
-
Select an application. The application must be a target application.
-
In the Details tab, toggle the Requestable box.
-
For every target application you desire to be requestable, repeat steps 2-3.
Add owners to resources
Before an end user can request access to a resource, you must associate it to an owner. Owners are the individual(s) responsible for monitoring who has access to the resource.
When an end user requests access to a resource, Identity Governance sends the request to the owner(s) for approval.
In access requests, the owner is referred to as the approver. When the owner approves the access request, Identity Governance provisions the resource to the end user.
Application owners
To assign owners to applications in Identity Cloud:
-
From the Identity Cloud admin UI, go to Applications.
-
Select an application. The application must be a target application.
-
In the Details tab, click the Owners field, and add as many owners as you desire.
-
Repeat steps 2-3 for every target application.
Entitlement owners
After you load entitlements into Identity Cloud, they display in the Entitlements section.
To assign owners to entitlements in Identity Cloud:
-
From the Identity Cloud admin UI, go to Entitlements.
-
Select an entitlement.
-
In the Details tab, click the Entitlement Owner field, and select an owner.
-
Repeat steps 2-3 for every entitlement.
Optionally, create and configure glossary attributes
Governance glossary attributes enable you to attach custom attributes to applications, entitlements, or roles.
When configuring resources that your end users can request access to, consider creating searchable governance glossary attributes. These attributes enable end users to filter and select a resource when requesting access.
Example of using glossary attributes with access requests
An example of using a governance glossary attribute would be to assign a risk level to each role, indicating the level of sensitivity associated with the resources granted to end users. This risk level attribute lets end users efficiently filter and search for roles based on their desired risk level when requesting access.
-
From the Identity Cloud admin UI, click Glossary.
-
Click Role > + Role Glossary Item.
-
Enter the following values:
Field Value Name
riskLevel
Display Name
Risk Level
Description
The level of risk associated with granting this resource to a user. The higher the risk, the more sensitive the resource.
Type
String
Enumerated Values
Enable and create the following in the text and value fields:
-
Low
-
Medium
-
High
Show advanced settings > Searchable
Enable
. This enables the end user to search and filter on the attribute when requesting access to the role. -
-
Click Save.
-
Populate each role in Identity Cloud with either
Low
,Medium
, orHigh
.To do this, navigate to Manage > Alpha realm - Roles and populate newly created role attribute
Risk Level
.
Optionally, manage access request workflows
When you configure access requests, you can manage the default workflows, also referred to as identity orchestration workflows.
Identity Governance has default workflows that function as-is. You can also customize the workflows to align with your organizational requirements.
To manage access request workflows:
-
Understand the access request types.
-
Define approval and script tasks for each access request type workflow.
-
Create the configurations using JSON and REST APIs.
-
Optionally, review and modify the default access request email templates.
Access request types
In Identity Governance, various types of access requests exist, and each type has a corresponding identity orchestration workflow.
The following table displays the different access request types:
Access request type | Name in REST APIs | Description |
---|---|---|
Grant Application |
|
Request access to an application. |
Remove Application |
|
Request to remove access to an application for an end user. |
Grant Role |
|
Request access to an Identity Cloud provisioning role. |
Remove Role |
|
Request to remove access to a role from an end user. |
Grant Entitlement |
|
Request access to an entitlement (additional privilege inside an application). |
Remove Entitlement |
|
Request to remove access to an entitlement from an end user. |
Tasks in identity orchestration workflows
Each workflow for an access request type involves the following tasks:
-
Approval tasks — Tasks that require user input.
-
Script tasks — Tasks for writing custom logic that have no user input.
Create your own approval and script tasks to meet the business needs of your organization.
All approval and script tasks in a workflow must be completed for Identity Cloud to grant access. |
The following sub-sections explain approval and script tasks. For information on how to create the configurations, refer to Manage workflows using JSON and REST APIs. |
Approval tasks
In each workflow, approval tasks require user input, such as an approver granting approval for a requested item.
The following table lists the items you can configure in each approval task:
Item | Description |
---|---|
Approvers for a review item |
Identity Governance uses the owner you define for each resource as the default approver. You can specify as many approvers as you need for an access request type. For example, you can specify that both a resource owner and a manager must approve the access request before the item(s) are provisioned to the end user. |
Specify the email to send when a review item gets assigned to an approver. |
The default email template is |
Specify the email to send when a review item gets reassigned to another approver. |
The default email template is |
Configure approval tasks expiration settings |
Set up expiration-related tasks for each approval task associated with an access request type. These tasks should encompass the following elements or actions:
|
Configure approval task escalation settings |
Set up escalation-related tasks for each approval task associated with an access request type. These tasks should encompass the following elements or actions:
|
Configure approval task reminder settings |
Set up reminder-related tasks for each approval task associated with an access request type. These tasks should encompass the following elements or actions:
|
For more information on the default access request email templates, refer to Review default email templates and modify.
Script tasks
Script tasks are similar to approval tasks in that they’re both required steps in the identity orchestration workflow; however, there are no user inputs with script tasks. Use script tasks to write custom logic for an access request type.
For example, after a request item is approved, you can specify Identity Governance to perform additional actions before provisioning access to an end user, such as populating an attribute in Identity Cloud to keep count of all resources a user has access to.
The default script tasks are:
-
Validate the access request:
-
If the access request is approved, give access (provision) to the application, entitlement, or role.
-
If the access request is rejected, remove access (de-provision) to the application, entitlement, or role.
-
-
If an approval task is rejected, reject the access request.
Split conditions and if-else paths in workflows
When you create a workflow definition for an access request type, you also define the paths that the workflow takes based on its conditions. Conditions are used with Script tasks.
You can define the following conditions in script tasks:
-
if-else — Also referred to as an exclusive gateway, an
if-else
conditional contains two outcomes. If one condition is met, take that outcome. Else, take another outcome. -
split — Also referred to as a switch or inclusive gateway, a split conditional allows many outcomes based on different conditions. Any condition or all conditions can be true.
JSON example
If you need to create a custom application grant workflow definition, follow the example in the JSON file: Application grant JSON file. For more information on field definitions, refer to the identity orchestration YAML file.
Use the JSON file, for example, in step 3 of Steps to manage workflow definitions.
Manage workflows using JSON and REST APIs
Identity Governance stores and saves workflow configurations in JSON format. You can manage the default workflow definitions for each access request type using REST APIs.
When you create a workflow definition for an access request type, the definition can be in one of the following states:
-
draft
— A staging state to validate a workflow definition before publishing. -
publish
— The workflow definition is live.
Steps to manage workflow definitions
-
Retrieve the current default workflow configurations for access request types using
/auto/orchestration/definition
(GET).Save a copy of the default workflow for the access request type in case of an error with your updated workflow JSON file. -
Modify the default workflow to suit your needs.
-
Create a new default workflow definition for an access request type in a
draft
state using/auto/orchestration/definition?_action=create
(POST).Each access request type can only contain one workflow definition in the
draft
andpublish
states. One can exist in thedraft
state and thepublish
state. -
Validate the workflow definition before publishing using
/auto/orchestration/definition?_action=validate
(POST). -
Publish the workflow definition from its
draft
state using/auto/orchestration/definition?_action=publish
(POST).You can’t delete workflow definitions in the published state. -
Repeat steps 1-5 for each access request type desired.
For more information, refer to identity orchestration APIs.
Review default email templates and modify
When enabled in your Identity Cloud tenant, Identity Governance creates default email templates for access request-related features. Identity orchestration workflows reference default access request email templates. You can modify these email templates if necessary.
-
From the Identity Cloud admin UI, go to Email > Templates.
-
View the following email templates and modify as necessary:
Some access request email templates use configurations set in the workflow definition for an access request type. The Notes column indicates if a template uses configurations. Email template name Description Notes Request Assigned
Initial email to the approver(s) of a resource when an end user submits an access request.
N/A
Request Reassigned
Email to the new assignee when an approver forwards a request item.
N/A
Request Escalated
Email to an individual assigned as the escalation point of contact.
Defines the escalation point of contact, start date of the notification email, and frequency in the workflow for each request type.
Request Reminder
Email to the approver(s) as a reminder that they have a request item to act on.
Defines the start date and frequency of the notification email in the workflow for each request type.
Request Expired
Email to the approver(s) when a request item expires. The end user defines the expiry of the access request when they submit the access request.
Defines the following workflow items for each request type:
-
Duration of the notification email before the request expires
-
Action to take when the access request expires including:
-
Reject the access request
-
Reassign to another user or role
-
Do nothing
-
These configurations only apply if the end user defines an expiration date in the access request. -
-
For each email template:
-
Click the desired template.
-
View the contents of the email.
-
If desired, update the email subject and body. For more information on customizing email templates, refer to Email templates.
To reference access request information in a variable in an email template, use syntax similar to the following:
request.user.userName
The variables you can reference depend on your tenant’s configurations; therefore, they’re specific to your organization.
To reference available attributes, from the Identity Cloud admin UI, go to Email > Template > Select template > Variables.
-